Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks

Size: px
Start display at page:

Download "Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks"

Transcription

1 Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks Alireza Keshavarz-Haddad Department of Electrical and Computer Engineering Rice University, 6100 Main Street, Houston, TX Rudolf Riedi Department of Statistics Rice University, 6100 Main Street, Houston, TX Abstract In this paper we establish fundamental limitations to the benefit of network coding in terms of energy and throughput in multihop wireless networks. Thereby we adopt two well accepted scenarios in the field: single multicast session and multiple unicast sessions. Most of our results apply to arbitrary wireless network and are, in particular, not asymptotic in kind. In terms of throughput and energy saving we prove that the gain of network coding of a single multicast session is at most a constant factor. Also, we present a lower bound on the expected number of transmissions of multiple unicast sessions under an arbitrary network coding. We identify scenarios for which the network coding gain for energy saving becomes surprisingly close to 1, in some cases even exactly 1, corresponding to no benefit at all. Interestingly, we prove that the gain of network coding in terms of transport capacity is bounded by a constant factor π in any arbitrary wireless network and for all traditional channel models. This shows that the traditional bounds on the transport capacity [1] [4] do not change more than constant factor π if we employ network coding. As a corollary, we find that the gain of network coding on the throughput of large scale homogeneous wireless networks is asymptotically bounded by a constant. Note that our result is more general than the previous work [5] and it is obtained by a different technique. In conclusion, we show that in contrast to wired networks, the network coding gain in wireless networks is constraint by fundamental limitations. I. INTRODUCTION In recent years, network coding has become an important research topic in network information theory. It has been shown that network coding can help improve the throughput and energy consumption of communication networks. Theoretical studies of network coding provide guidelines for designing or improving efficient and high performance wired or wireless networks. In this paper, we present theory leading to fundamental bounds on the gain network coding in arbitrary wireless networks. In particular, our work reveals that the benefit of network coding is limited by constants depending only on the dimension of the underlying space. Today, studies on network coding have grown to large numbers, mostly focussing on benefits in terms of throughput or energy saving. In this paper we study the fundamental limitation of network coding in the same terms and identify scenarios where the network coding gain on the performance is noticeably small. To the best of our knowledge, this is the first paper which studies the bounds on the gain of network coding in terms of energy saving in wireless networks. As the first contribution of this paper, we prove that the energy gain of network coding for a single multicast session is bounded by a small constant factor in an arbitrary wireless network. The constant factor is 17 for planar wireless networks. This lies in stark contrast to wired network where the network coding gain in terms of energy consumption and throughput can be unboundedly large [6]. As the second contribution, we bound the throughput gain of network coding for a single multicast session in an arbitrary wireless network. We show that network coding can improve the throughput in wireless networks by at most a constant factor which is determined by the parameters of the underlying wireless channel model. As the third contribution, we study the energy gain for multiple unicast sessions in an arbitrary wireless network. We compute a novel lower bound on the expected number of transmissions. Assuming that each transmission carries the same size packet and that energy consumption is proportional to the number of transmissions, we find thus an upper bound on the energy gain of network coding. In addition, we identify important scenarios where network coding benefits in terms of energy consumption constitute a relatively small amount, in some cases none at all, e.g., for certain traffic patterns in wireless sensor and mesh networks. As the fourth contribution, we study the benefit of network coding in terms of the throughput of wireless networks for multiple unicast sessions. We prove that network coding can increase the transport capacity by at most a constant factor π in an arbitrary wireless network. From this, we conclude that the traditional bounds on the transport capacity [1] [4] would increase by at most a factor of π if we employed network coding. We also prove that the gain of network coding on the throughput of large homogeneous wireless networks is most a constant factor. This result is more general than the result of previous work [5] which has been proved for only a particular topology and wireless channel model. In summary, we provide several important novel insights, especially on sensor and mesh networks, and generalize to arbitrary networks several results that had been known only for special cases. The paper is organized as follows. In Section II, we review some related work. We introduce the network model and notations in Section III. We bound the network coding gain

2 2 in terms of energy and throughput for a single multicast in Section IV. Next, in Section V, we study the benefit of network coding in wireless networks for multiple unicast sessions. Finally, we conclude the paper in Section VI. II. RELATED WORK Network coding was first introduced in the seminal paper by Ahlswede et al. [7] in which it was proven that the maximum flow capacity of a single multicast session can be achieved using network coding in an arbitrary network with directional links. Later, [8] and [9] show constructively that the linear network codes can achieve the capacity of a single multicast session as well. Since then, a large body of work has explored the construction of efficient network coding algorithms, e.g., [6], [8] [15]. For the networks with bidirectional links, [16], [17] show that network coding improves the throughput by at most a constant factor 2 for a single multicast. The constant factor turns out to be equal to one (no benefit) in the case of a single unicast or a broadcast. Note that these results do not extend for wireless networks where the channel is considered bidirectional. In fact, network coding combined with wireless broadcasting can potentially improve the performance in terms of throughput, energy efficiency, and congestion control in wireless networks [18], [19]. The potential of network coding for energy savings in broadcasting in ad hoc networks was established in [20], [21]. Here, we complement this valuable insight by show that such a gain is in fact bounded by a small constant for any wireless multicast. Moreover, we clearly strengthen the results of [22] for the maximum flow achievable in random wired and wireless networks (modeled as geometric random graphs) for a single multicast session by taking wireless interference into account. The case of multiple unicast sessions in wireless networks is studied in [23], [24]. They studied cases where network coding would provide only marginal benefits. Most recent work [5] shows that the unicast capacity gain of network coding in ad hoc networks is asymptotically bounded by a constant factor, as the network is scaled to large size. We would like to take the opportunity to point out that we provide more general results which are non-asymptotical and valid for any network. It should be mentioned that some papers assume correlation between the generated information from different sources in the network. They combine network coding with Distributed Source Coding (DSC) techniques to optimize the coding gain in the network [25], [26]. However, in this paper, we focus on pure network coding gain. In other words, we assume that the sources generate independent information. III. MODEL ASSUMPTIONS In this section, we describe the models and notions used in this paper. A communication network is a collection of directed (or undirected) links connecting communication devices (nodes). The links can be established through actual wired or wireless transmissions. Here, we consider an arbitrary wireless networks. We assume that the channel is bidirectional and multiple-access in wireless network. We emphasize that we consider an arbitrary topology for the wireless network. However, we assume that the topology has the connectivity which is needed for establishing the demanded sessions. We assume that the nodes are distributed in d-dimensional Euclidean space R d and denote the set of nodes by V. A. Wireless Channel Models We employ the Protocol and the Physical Model [1], [2] for modeling the wireless channel. We denote the set of transmitter-receiver pairs of simultaneous direct transmissions active at a given time by SD := {(S 1, D 1 ), (S 2, D 2 ),..., (S m, D m )}. Also, we denote the set of transmitters by S := {S 1,..., S m }. Note that these sets vary over time; if not otherwise indicated, however, we will consider one fixed but arbitrary time instant. For simplicity of notation, the node symbols are used also to represent their locations. For example, S i D i is the Euclidean distance between the nodes S i and D i in R d. In both, the Protocol and the Physical Model the assigned transmission rate from node S i S to node D i is W i = W for a successful transmission where W is the channel capacity; for unsuccessful transmissions we set W i = 0. Note that we assume a broadcast channel for wireless networks, so a transmission will typically be received by several nodes simultaneously. On one hand, broadcasting data to all neighbors can help to increase the throughput, on the other hand, simultaneous reception from different nodes is not feasible because of interference. 1) Protocol Model: Under the Protocol model a transmission is modeled as successful if S k D i (1 + )r for all S k S\{S i }, and S i D i r where > 0 is the interference parameter and r > 0 the transmission range. 2) Physical Model: Under the Physical model a transmission is modeled as successful if P G ii SINR = N o + k i,k S P G β (1) ki Here, β is the SINR-threshold, N o represents the ambient noise, and G ki denotes the signal loss, meaning that P G ki is the receiving power at node D i from transmitter S k. We assume a low power decay for the signal loss of the form G ki = S k D i α, where α > d is the signal loss exponent. We introduce the parameter r max as the maximum possible distance between a transmitter and receiver to ensure a successful transmission under the Physical Model. Equation (1) ( ) 1/α. P implies that r max = βn o Note that rmax is different than the radio range parameter r in Protocol Model. Here, a transmitter can achieve the range of r max only if no other simultaneous transmission occurs in the network. We will use parameter r max as transmission range (corresponding to the best case) to compute the minimum energy needed for transporting a given set of bits. However, for analyzing the maximum throughput, we apply (1) which models the effect

3 3 interference on a set of simultaneous transmissions in the wireless network. B. Connectivity Graph and Traffic Pattern Wireless networks are usually modeled by geometric graphs. The nodes of network are the vertices V of the geometric graph. Two nodes are considered adjacent and connected by an edge e E, if the distance between them is less than a certain value r G. We build the connectivity graph of a given wireless network by setting r G = r for the Protocol Model and r G = r max for the Physical Model in the geometric graph model. We represent the connectivity graph by G = (V, E). It is easy to show that in order to establish some sessions in the wireless network there must exist a path in G between the source and the terminals of each session. We represent multiple unicast sessions by the set of sourceterminal pairs AB := {(A 1, B 1 ),..., (A k, B k )} where A := {A 1,..., A k } and B := {B 1,..., B k } are the sets of sources and terminals. We refer to the hop-count distance of two nodes A i from B j by l(a i, B j ). For the networks with directed links, l(a i, B j ) is the hop-count length of shortest directed path from A i to B j. While the computation of the shortest paths in real-world scenarios are often hampered by incomplete information or other restrictions, using shortest paths is certainly appropriate when deriving theoretical bounds, as they constitute the best of worlds in terms of routing. Also, we define the distance of B j from a set of nodes A as usual as l(a, B j ) = min{l(a i, B j ) : A i A}. C. Transport Capacity The transport capacity is an important parameter of a wireless networks, which reflects the maximum sum of the rates and the number of transmissions of unicast sessions. Note that the unit of transport capacity is bit-meter per second which is different from the unit of throughput (bit per second). Interestingly, by computing the transport capacity of wireless network one can estimate the average throughput rate of the unicast sessions. The transport capacity of a set of sourceterminal pairs AB, is defined as: C T (AB) := max multi-hop paths A k B k R k (2) where R k is the average rate of unicast session between of A k and B k over a given multi-hop path. The maximum is taken over all possible multi-hop routes establishing the required connections between the sources and terminals. A simple upper bound which actually does not depend on the set AB is found by noting that for the simultaneous routes achieving C T there must be a time instance where the simultaneous direct hop-forwarding transmission reach at least C T [1]. Therefore, C T (AB) max SD k (S i,d i) SD S i D i W i (3) where the maximum is over all possible sets of simultaneous, direct transmissions SD, also W i is the transmission rate of (S i, D i ) transmitter-receiver pair. The transmission rate is computed based on the channel model. D. Data Stream and Energy Consumption Model We will use in our arguments a simple non-coding scheme which routes as commodity flows (replication, forwarding), a scheme we call the flow scheme. In contrast, we denote by a coding scheme any scheme using all of the operations of a flow scheme and in addition allowing the packets to be decoded or recoded at each node where they are received. In addition, in a coding scheme, intermediate nodes can send the results obtained from applying arbitrary functions to all previously received data and their own source data such with the only restriction that each destination node is able to decode the data intended for it from all of its received bits and local data. We call a single multicast session or multiple unicast sessions optimally source coded, if the data streams generated by the source nodes are in optimally compressed format and independent from each other. More precisely, let the random process X(A i ) denote the binary data stream generated by a source node A i. We assume that X(A i ) is in some optimal data compression format. Short, X(A i ) has the maximum integral entropy rate. In addition, we assume that the random processes X(A i ) for different A i are independent of each other, meaning that different sources generate independent information. Agreeably, this manifests a simplifying yet appropriate assumption. Indeed, assuming some dependence among the generated information leads naturally to Distributed Source Coding (DSC) techniques for maximizing the throughput [25], [26]. However, the focus of this paper lies in pure network coding gain and not in (single nor multiple) source coding gain. We quantize the consumed energy for transporting information by assuming that every transmission sends a constant amount of information, i.e. 1 bit. Consequently, the consumed energy for transporting the information becomes proportional to the number of transmissions. Note that we assume that each transmission consumes the same amount of energy, independently of distance. As a particular consequence of our setting, we assume that the header is not used as information, so the only 1 bit of information that is transmitted is the content of each transmission. Consequently, we do not consider the overhead provided by routing, nor potential ways to exploit routing information. In addition, we assume that the information cannot be communicated between the nodes without transmission, in other words, timing or omission of transmissions does not provide any new information to the receiver nodes. This can give us a good estimation of energy consumption in real wireless networks when the packet size is large compare to the header size. Note that we also do not consider the energy consumption of the nodes used for carrier sensing, reception, MAC control packets in wireless communication. From these assumptions, we can show that the expected number of transmissions for sending k specific bits of the data stream of some sources between two part of the network is at least k. Because the values of the bits are independent and each bit is equal to 0 or 1 with probability 1/2 and also

4 4 each transmission delivers 1 bit. Note that the expectation is computed over different realizations of data streams of the sources. In summary, the following assumptions are used for our analysis. A1 (Optimality source-coded data): Each source generates a data stream in an optimally compressed format. A2 (Independence of information for different sources): Different sources generate independent information. A3 (Energy consumption): The consumed energy for transporting the information is proportional to the number of transmissions and each transmission delivers 1 bit. IV. BOUNDS ON THE GAIN OF NETWORK CODING FOR SINGLE MULTICAST In this section we bound the benefit of network coding in terms of energy savings and throughput for a single multicast session in wireless networks. A. Energy Gain of Network Coding for a Single Multicast Here, we study the energy consumption of a single multicast session in an arbitrary wireless networks. Examples for wireless networks are provided in [20], [21] in which the benefit of network coding in terms of reducing the number of transmissions (energy saving) of a broadcast session achieve the factors of 2 and 4/3, respectively. In [6], an example for a wired network with directed links is depicted where the gain of network coding on the throughput and energy is proportional to log(#v ), where #V is the number of nodes. In Theorem 1 we prove that under assumption A1 and A3 the expected number of transmissions can be reduced by at most a constant factor for a single multicast session. Certainly, a coding scheme can reduce the number of transmissions of a multicast session. Nevertheless, as we will argue, the mutual location of source and terminals within the network topology together with the geometric properties of the wireless channel models enforce a minimal number of transmissions for transporting the bits under any arbitrary network coding. These minimal transmissions establish certain communication paths which can be exploited by a flow scheme to deliver the same information to the same terminals with just a constant factor more transmissions. As we show, this factor is surprisingly small. The rigorous argument of Theorem 1 uses the following topological parameters. Let M be the set of all terminals together with the source of the single multicast session. Next, let H 0 be a Maximal Independent Set (MIS) of M, i.e. H 0 is a set with maximal size such that no two nodes of H 0 are neighbors in the connectivity graph G = (V, E). By definition, we can show that every node of M is either in H 0 or has at least one neighbor in H 0. In wireless networks this means that every two nodes of H 0 are in distance larger than radio range (r for the Protocol Model and r max for the Physical Model) from each other. However, each node of M is located inside of the radio range of at least one node of H 0. Fig. 1. The nodes of M have been colored black. The figure shows U which is built in 3 steps by considering the components of H 1, H 2, and H 3. Iteratively, let H i = {u V : l(u, H i 1 ) 1} for i 1. Clearly, H 0 H 1 H 2... (see Fig. 1). We also define G 0 = H 0 and G i = H i \ H i 1. The following notation will come in handy: Let κ d be the maximum number of nodes that can be placed in the unit d-dimensional sphere, such that every two of them have a distance strictly larger than 1. We find quickly that Further let κ d := 2 if d = 1 5 if d = 2 13 if d = 3 (4) k := min{j : the nodes of H j are connected} (5) n i := #{connectivity components of H i } (6) Clearly, n 0 n 1... n k = 1. Next, we establish three lemmas which will be instrumental for the proof of Theorem 1. Lemma 1: Denote the number of transmissions for sending a multicast bit under an arbitrary coding scheme by N. Then under assumptions A1 and A3, E[N] n 0 /κ d (7) Proof of Lemma 1: We compute a lower bound using some geometric properties of wireless networks and the channel model. By the geometric property of κ d we find that every transmission can cover at most κ d nodes of H 0. Next, we prove (7) using a contradiction argument. If (7) is not satisfied, then there exists a terminal in H 0 where the expected number of transmissions which it receives per multicast bit is less than 1. That node cannot decode all bits sent by the source correctly, because the source sends optimally compressed information. Lemma 2: Denote the number of transmissions for sending a multicast bit under an arbitrary coding scheme by N. Then under assumptions A1 and A3, E[N] n n k (8) Proof of Lemma 2: Here, we derive the lower bound by considering the graph topology of the network introduced above. We consider the cutset between H i 1 and V \ H i 1 (the set of edges between G i 1 and G i ). We claim that the

5 5 expected number transmissions which is needed in the cutset for disseminating a multicast bit through H i 1 components is at least n i. Again, we prove the claim by a contradiction argument. If the claim is not true, then for at least one of the connectivity components of H i the expected number of transmissions in the cutset per multicast bit is less than 1. So, the terminals of that component cannot decode all generated bits correctly. Note that we consider the direction of the transmission for a component of H i 1 from G i 1 to G i if the component contains the source node, and from G i to G i 1 if it does not contain the source. Since, G 0, G 1,..., G k represent a partitioning over the set of nodes. Therefore, the expected number of transmissions for a multicast bit is at least n n k. Lemma 3: There exists a flow scheme for the multicast session which transports every bit using N transmissions, where N 3n 0 + 2(n n k ) 2k 1 (9) Proof of Lemma 3: For the proof it is enough to show that there exists a set of nodes U V, such that the size of U is equal to N and the induced graph by U is connected, contains the source node, and covers all terminals. We Build U in k + 1 steps. First, we set U 0 = H 0. Clearly, U 0 covers all nodes of M. For 1 i k, we let U i be the set obtained by adding the minimal number of nodes U i 1 in order to reduce the number of connectivity components from n i 1 to n i. The set U k is our target set U. Next, we bound the number of nodes which are added to U i 1 at step i. Without loss of generality, we may assume that n i 1 > n i. This means n i 1 n i connections are created among the components of H i 1 after building H i. We show that at most 2i(n i 1 n i ) nodes are need to create those connections among the corresponding components. As an illustrative example, consider H (1) i 1 and H(2) i 1 as two components of H i 1 which get connected after building H i. It follows from the definition of H i that there exists a path of length 2i or 2i + 1 between two nodes of H 0 which belong to H (1) i 1 and H(2) i 1. Because, from the definition, the nodes of H i are at most i hop away from at least one node in H 0. So, two components are connected as we build H i from H i 1 only if one of the depicted scenarios in Fig. 2 occurs. Then, we add 2i 1 or 2i nodes to the path which connect the terminals to U. This process is repeated n i 1 n i times to connect all the corresponding components of H i 1. So, by continuing this algorithm and increasing i, the set U k gets connected in the k th step. Finally, we add the source node to U k if it does not belong to it already. Clearly, the size of U is bounded by 1 + n 0 + k i=1 2i(n i 1 n i ) = 3n 0 + 2(n 1 + n n k 1 + n k ) 2k 1. Theorem 1: Consider a single multicast session which is optimally source coded in an arbitrary wireless network. The gain of network coding in terms of reducing the expected number of transmissions is less than a factor of 3κ d +2, where κ d is defined in (4). Fig. 2. Two components H (1) i 1 and H(2) i 1 are connected after building H i if and only if one of these two scenarios occurs. Proof of Theorem 1: Lemmas 1 and 2 give us lower bounds on the expected number of transmissions (E[N]) under any arbitrary network coding scheme. Also, Lemma 3 shows that there exists a flow scheme which uses N transmissions per multicast bit. It follows that the benefit of network coding in terms of reducing the expected number of transmissions is bounded by N /E[N]. From (7), (8) and (9), it easy to show that N /E[N] < 3κ d + 2. Remark: The proof of Theorem 1 also shows that the presented algorithm for building U in Lemma 3 can estimate the minimum multicast tree of a multicast session (Steiner tree) in a geometric graph up to the constant factor 3κ d + 2. To the best of our knowledge this, per se, constitutes a novel result in graph theory. Next, we point out two particularly interesting scenarios, where concrete and simple bounds on the network coding gain can be given (see corollary 1). In the first case, the long path scenario, the source and the terminals are located far from each other (i.e. γ 1 << 1). Then, the gain of network coding is bounded by a constant close to 2. The intuitive reason behind this result lies in the fact that any network coding scheme still needs to establish some disjoint paths to the terminals which are located far from each other. In the second case, explicit knowledge of the multicast tree leads to tighter bounds on the network coding gain. Corollary 1: Assume that n 0, n 1,..., n k are defined as (6) for an optimally source coded single multicast session. Then the gain of network coding on the expected number of transmissions is bounded as the following (i) If n 0 = γ 1 (n n k ), the gain is bounded by a factor 3γ for γ 1 < κ d and κ d (3 + 2/γ 1 ) for γ 1 > κ d. (ii) If there exists a multicast tree with size of N m such that N m γ 2 max(n 0 /κ d, n n k ), the gain is bounded by a factor γ 2. Proof of Corollary 1: (i) The bound on N /E[N] can be easily computed using Lemmas 1, 2, and 3. (ii) Obviously, we have N m /E[N] γ 2 using Lemmas 1 and 2.

6 6 B. Throughput Gain of Network Coding for a Single Multicast The throughput of a single multicast sessions on a directed graph has been a popular case of study in network coding papers [6] [9]. Here we prove that network coding can increase the throughput of a single multicast session in wireless networks by at most a constant factor, in contrast to wired network where the throughput can be increased unboundedly large using network codes [6]. We emphasize that the results of [16], [17] which are obtained for wired network with bidirectional are not applicable for wireless network model. There are two main differences between the wired and wireless network models which make the network coding gain very different in these networks. First, in the wireless networks we assume that a node receives one signal at a time (simple point-to-point coding for wireless communication). So, the receiving rate of every node is bounded by the wireless channel capacity. However, in the wired network model a node can receive several different bits over several links simultaneously, and there is no such bound for the receiving rate. Second, in wireless network model, noise and interference constitute additional limiting factors for the network capacity. The SINR model for noise and interference which form a part of one of our channel models lead to geometric constraints which in turn imply the fundamental bounds we derive. However, the wired network model is not limited by such geometric constraints and can be in the form of any arbitrary directed or undirected graph. Theorem 2 shows that network coding can increase the throughput of a single multicast session by at most a constant factor. Theorem 2: Assume Protocol or Physical Model for the wireless channel. Consider a single multicast session which is optimally source coded in an arbitrary wireless network. Then, the network coding gain on the throughput of the multicast session is at most a constant factor c, where 2 + (1 + ) d + 3 d c := d (5 d 2 d ) (2 + ( β J >0 ) J Z d J α 1 α 1 ρ α ) d (10) under Protocol Model and Physical Model respectively (ρ > 1 is a constant). Proof of Theorem 2: Consider an arbitrary terminal of the multicast session. The maximum rate at which data can be received by the terminal is equal to the wireless channel capacity W. By considering the cutset which separates the terminal from other nodes, we conclude that W is an upper bound on the throughput of a multicast session under any arbitrary network coding. On the other hand, in [27], [28] flow scheme for Protocol Model and Physical Model are constructed with a broadcast throughput of W/c for any connected wireless network, where c is some constant determined by the channel model as (10). Such flow schemes can be used to send the data from the source to all terminals with rate W/c. This shows that network coding can improve the throughput of a single multicast session by at most a factor c. Note that despite its apparent similarity to the proofs of previous work [27], [28], our argument is in fact different since network coding has not been taken into account in the mentioned existing work. Here, we study the gain of network coding on the throughput a multicast session. V. BOUNDS ON THE GAIN OF NETWORK CODING FOR MULTIPLE UNICAST In this section we study the benefit of network coding for multiple unicast sessions in terms of energy and throughput. By assumption, energy savings are proportional to savings in the number of transmissions needed. We first bound the gain of network coding in terms of the number of transmissions, then in terms of the throughput. A. Energy Gain of Network Coding for Multiple Unicasts Here, we investigate the benefit of network coding in terms of energy saving for multiple unicast sessions. Note that in the single multicast scenario, network coding benefits by distributing the same information on different links and by efficiently using the links for sending the information toward several terminals. However, in multiple unicasts scenario, the links carry some independent information of different unicast sessions (assumption A2). Intuitively, there is less chance for network coding to benefit in terms of the number of transmissions for unicast sessions. We will explore this fact more precisely later. Theorem 3 provides a lower bound in terms of the expected number of transmissions for multiple unicast sessions. The lower bound is determined simply by considering the hopcount distance of the source and terminal nodes. Interestingly, the theorem is also valid for wired networks under assumptions A1, A2, and A3. Notably, the bounds of Theorem 3 apply to any set of optimally coded bits with independent information sent in unicast from a set of senders to their terminals. If the bits considered are such that the set of sources and the set of terminals are distant from each other, the lower bound becomes tighter. Theorem 3: Assume that b 1, b 2,..., b k are optimally source coded bits of some simultaneous unicast sessions. Denote N as the number of transmissions used by an arbitrary coding scheme for transporting these bits. Also, denote the source and terminal of bit b j by A j and B j for j = 1,..., k (a node can be the source or destination for several bits). Then, E[N] max[ k l(a j, B), j=1 k l(a, B j )] (11) j=1 Remark: We should point out that the source and the terminal of a unicast session are repeated equal to the number of bits of that the session has among b 1, b 2,..., b k in the sum of equation (11). When the average rate of unicast sessions is given, we can choose the number of bits of each session

7 7 Fig. 3. Grouping the nodes in terms of their distances from the set of terminals. proportional to its average rate in order to compute a lower bound for the rate of energy consumption. Proof of Theorem 3: We group the nodes of the network in terms of their distances from the set of terminals (B). We define H 0 = B and H i = {u V : l(u, B) i}. Also, we define G 0 = H 0 and G i = H i \ H i 1. It is easy to show that the nodes of G i are only connected to the nodes of G i 1, Gi and G i+1. Fig. 3 shows the transmissions which carry the bits among different groups. Denote the number of sources which are not in H i by q i. Clearly, q i = j I [l(a j,b)>i]. Note that the cutset between V \ H i to H i is the set of edges between G i+1 and G i (in directed graph, consider the edges directed from G i+1 to G i ). From the assumptions b 1, b 2,..., b k are independent optimally compressed bits. So, for transmitting them from V \ H i to H i the expected number of transmissions is at least q i. Therefore, the expected number of transmissions for transporting the bits all unicast sessions under any arbitrary network coding is at least i=0 q i. Then we have E[N] = q i = i=0 k j=1 i=0 k i=0 j=1 I [l(aj,b)>i] = I [l(aj,b)>i] k l(a j, B) j=1 Similarly, by grouping the nodes in terms of distance from the set of sources (A) and applying the same method, we can show that E[N] k j=1 l(a, B j). Two symmetrical cases of particular interest lead to a simple yet striking conclusion of when network coding should not be employed. Namely the case when independent unicast connections have either the same source or the same terminal. Surprisingly, network coding provides no benefit at all in terms of the number of transmissions in these cases (see Corollary 2). Examples of such scenarios include sensor networks where the sensors send independent sensing information to a set of sinks. Note that every sensor needs to send its information to at least one of the sinks, but it does not matter which one. If we consider a virtual node (say a super-sink) which receives the information of the sinks by direct (wired) links, then the traffic becomes similar to case (i) of Corollary 2 below. Another concrete example concerns a certain part of traffic in mesh networks with an internet gateway, namely independent uplink traffic toward gateway (case (i)) and independent downlink traffic from the gateway (case (ii)). So, in mesh networks, network coding does not benefit the energy consumption for uplink and downlink traffic separately. However, note that network coding would still benefit by combining the uplink and downlink packets [14], [15] or for transporting multicast and broadcast packets [20], [21]. Note that [26] studies case (i) more generally by considering a cost function in a single sink sensor networks. The paper shows that when the sources are independent and the cost is proportional to the number of transmissions, then shortest path routing protocol has the minimum cost. This is agrees with our result which is proved in by a different technique. Corollary 2: Consider multiple unicast sessions with optimally source coded data stream. For the following two scenarios, there is no network coding benefit in terms of the number of transmissions (energy). (i) A set of sources send their independent information to a single sink. (ii) A single source sends independent information to each of a set of terminals. Proof of Corollary 2: We establish the claim by showing that the shortest-path flow scheme is the most efficient scheme among all flow and coding schemes. If we use the flow scheme which transports the bits over the shortest path, then the number of transmissions is equal to k i=1 l(a i, B) in case (i) and equal to k i=1 l(a, B i) in case (ii) of Theorem 3. So, we conclude that network coding does not benefit in terms of reducing the number of transmissions for these scenarios. B. Throughput Gain of Network Coding in Wireless Networks Here, we bound the gain of network coding on the throughput of multiple unicast sessions in wireless networks. We study the transport capacity and the throughput of the sessions under an arbitrary coding scheme. Theorem 4 shows that the maximum transport capacity of an arbitrary network under an arbitrary coding scheme is bounded by constant factor π of the maximum transport capacity computed under the flow scheme. Therefore, the gain of network coding on the maximum transport capacity of arbitrary wireless network is bounded by a factor of π. Moreover, the theorem shows that the computed upper bounds on the transport capacity in previous works [1] [4] increase by at most factor of π when we employ network coding in an arbitrary wireless network. Theorem 4: Denote the maximum transport capacity of an arbitrary wireless network by using the flow scheme and coding scheme by CT f and Cnc T respectively. Then, C nc T K d C f T (12)

8 Fig. 4. l x is an geometric cutset for some source-terminal pairs of AB. where K d = 2 if d = 1 and K d = π if d = 2, 3 (d is the dimension of the space). Proof of Theorem 4: We prove the theorem in d = 2 dimensional space. The proof can be easily extended for d = 1, 3 dimensional space using the same method. We use the following lemma for our arguments. The proof of lemma is in the technical report of this work [29]. Lemma 4: Consider an arbitrary set of vectors Q = { a 1,..., a k } in d-dimensional space. Then, there exists an unit vector i and a set Q Q such that a j K d i a j (13) a j Q a j Q (K d is the same as Theorem 4). For the proof of theorem, we consider an arbitrary set of unicast sessions AB = {(A 1, B 1 ),..., (A k, B k )} with average rates R 1,..., R k. Next, we define a j = R j A j B j. By Lemma 4, there exists an unit vector i and AB AB such that R j A j B j K d R j A j B j i (14) Then, we rotate the Cartesian axes such that the axis X is aligned on the direction of unit vector i. We denote the orthogonal line which crosses axis X at point x by l x (see Fig. 4). Also, we denote I [AjB j l x] as the indicator function that the line segment A j B j has been intersected by line l x. Note that if (A j, B j ) AB and I [AjB j l x] = 1, then we can show that A j is located in the left side and B j is located in the right side of l x because A j B j i > 0 (see the proof of Lemma 4). Therefore, (A R j,b j) AB ji [AjB j l x] is the average rate of information for the unicast sessions of AB which go from the left to the right side of line l x. Denote the set of simultaneous transmissions at time instant τ by SD τ = {(S 1, D 1 ),..., (S m, D m )}. Then, the rate of bits are transmitted across l x at this time instant is W j I [SjD j l x]. Therefore, from the definitions we have 1 T R j I [AjB j l x] lim W j I [SjD T T j l x]dτ 0 (15) Now, we take integral by moving l x from x = to, R j A j B j i = = R j I [(Aj,B j) l x] dx T lim 1 T T T 1 = lim T T 0 0 R j I [(Aj,B j) l x] dx W j I [SjD j l x]dτ dx W j I [SjD j l x]dx dτ 1 T = lim W j S j D j i dτ T T 0 1 T lim W j S j D j dτ T T 0 max S j D j = CT f SD,τ W j Finally, by (14) we conclude that CT nc = max ( R j A j B j ) K d CT f (16) AB Next, we study the gain of network coding on the throughput of large homogeneous networks which is a popular model in network capacity papers [1] [3], [30], [31]. Corollary 3 proves that network coding does not change the asymptotic behavior of the throughput of large homogeneous wireless networks. Prior work (see [5]) shows a similar result under the Protocol Model for the wireless channel. Here, we establish the bound also under other channel models, i.e., the nonsymmetric Protocol Model [1], [2], the Physical Model, and the Generalized Physical Models [3]. Further, our technique of proof is definitely different from [5] since we base our argument on the transport capacity. Corollary 3: Network coding gain on the throughput of large homogeneous wireless networks is bounded by a constant factor. Proof of Corollary 3: In previous works [1] [3] provide some asymptotic upper bounds on the throughput (sum of the rates of unicast sessions) of large homogeneous networks under various channel models. They do so in two steps. First, an upper bound on the transport capacity (CT f ) is computed. Second, it is divided by the average distance of source-terminal pairs (L). On the other hand, [1], [2], [30], [31] provide 8

9 9 some flow schemes to achieve a throughput within a constant factor of the computed upper bounds. The throughput of these schemes represent tight lower bounds on the throughput capacity of the network. Now, by Theorem 4, the gain of network coding on the transport capacity is bounded by a factor of K d. Therefore, if we employ network coding then the throughput will be smaller than K d multiply by the traditional upper bounds [1] [3] (which have been computed for flow schemes). We also note the flow schemes can achieve the traditional upper bounds up to a constant factor [1], [2], [30], [31]. From these, we conclude that the network coding gain on the throughput is bounded by a constant. VI. CONCLUSION In this work we studied fundamental limitations of the benefit of network coding for arbitrary wireless multihop networks. We focused on two popular network scenarios: single multicast session and multiple unicast sessions. We proved the benefit of network coding in terms of throughput or energy saving is bounded by a constant factor for a single multicast session. Also, we computed bounds for the gain of network coding in terms of number of transmissions for multiple unicast sessions. Interestingly, we showed that network coding has no benefit in terms of energy in sensor networks where the sensors gather independent information for the sink or in mesh networks for unidirectional traffic from/towards the gateway. In addition, we proved that network coding can increase the transport capacity of an arbitrary wireless network by at most a factor of π. This result verifies that network coding does not change the throughput of large homogeneous networks more than a constant. The established bounds, complemented with previous related work on capacity bounds [1] [5], seem to indicate that network coding plays valuable but not crucial role with regards to the performance of wireless networks. Rather, channel interference and topology of wireless networks seem to emerge as the determinant parameters on the throughput and energy consumption. ACKNOWLEDGMENT Financial support comes in part from NSF, grant number ANI REFERENCES [1] P. Gupta and P. R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory, vol. 46, no. 2, pp , [2], Internets in the sky: The capacity of three dimensional wireless networks, Communications in Information and Systems, vol. 1, no. 1, pp , [3] A. Agarwal and P. R. Kumar, Capacity bounds for ad hoc and hybrid wireless networks, Computer Communication Review, vol. 34, no. 3, pp , [4] A. Keshavarz-Haddad and R. Riedi, Bounds on the capacity of wireless networks based on topology and demands, in MobiHoc, [5] J. Liu, D. Goeckel, and D. Towsley, Bounds on the gain of network coding and broadcasting in wireless networks, in INFOCOM, [6] S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. M. G. M. Tolhuizen, Polynomial time algorithms for multicast network code construction. IEEE Transactions on Information Theory, vol. 51, no. 6, pp , [7] R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol. 46, no. 4, pp , [8] S. Y. R. Li, R. W. Yeung, and N. Cai, Linear network coding, IEEE Transactions on Information Theory, vol. 49, no. 2, pp , [9] R. Koetter and M. Medard, An algebraic approach to network coding, IEEE/ACM Transactions on Network, vol. 11, no. 5, pp , [10] P. Chou, Y. Wu, and K. Jain, Practical network coding, in Allerton, [11] M. Mdard, M. Effros,, D. Karge, and T. Ho, On coding for nonmulticast networks, in Allerton, [12] T. Ho, M. Medard, J. Shi, M. Effros, and D. R. Karger, On randomized network coding, in Allerton, [13] R. Dougherty, C. F. Freiling, and K. Zeger, Insufficiency of linear coding in network information flow, IEEE Transactions on Information Theory, vol. 51, no. 8, pp , [14] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft, XORs in the air: practical wireless network coding, in SIGCOMM, [15] S. Sengupta, S. Rayanchu, and S. Banerjee, An analysis of wireless network coding for unicast sessions: The case for coding-aware routing, in INFOCOM, [16] Z. Li and B. Li, Network coding in undirected networks, in CISS, [17] Z. Li, B. Li, and L. C. Lau, On achieving maximum multicast throughput in undirected networks, IEEE/ACM Transactions on Networking, vol. 14, no. SI, pp , [18] D. S. Lun, M. Mdard, and R. Koetter, Efficient operation of wireless packet networks using network coding, in IWCT, [19], Network coding for efficient wireless unicast, in IEEE International Zurich Seminar on Communications, [20] C. Fragouli, J. Widmer, and J. Y. L. Boudec, Energy efficient broadcasting in wireless ad-hoc networks using network coding, in First Workshop on Network Coding, [21], A network coding approach to energy efficient broadcasting: from theory to practice, in INFOCOM, [22] A. Ramamoorthy, J. Shi, and R. D. Wesel, On the capacity of network coding for random networks, IEEE Transactions on Information Theory, vol. 51, no. 8, pp , [23] Z. Li and B. Li, Network coding: The case for multiple unicast sessions, in Allerton, [24], On increasing end-to-end throughput in wireless ad hoc networks, in Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, [25] T. Ho, M. Medard, M. Effros, and R. Koetter, Network coding for correlated sources, in CISS, [26] J. Liu, M. Adler, D. Towsley, and C. Zhang, On optimal communication cost for gathering correlated data through wireless sensor networks, in MobiCom, [27] A. Keshavarz-Haddad, V. Ribeiro, and R. Riedi, Broadcast capacity in multihop wireless networks, in MobiCom, [28] A. Keshavarz-Haddad and R. Riedi, On the broadcast capacity of multihop wireless networks: Interplay of power, density and interference, in SECON, [29], Bounds on the benefit of network coding for multicast and unicast sessions in wireless networks, Rice University, Tech. Rep. TR , [30] M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, On the throughput capacity of random wireless networks, IEEE Transactions on Information Theory, [31] S. R. Kulkarni and P. Viswanath, A deterministic approach to throughput scaling in wireless networks, IEEE Transactions on Information Theory, vol. 50, no. 6, pp , 2004.

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Towards Reliable Broadcasting using ACKs

Towards Reliable Broadcasting using ACKs Towards Reliable Broadcasting using ACKs Mathilde Durvy Email: mathilde.durvy@epfl.ch Christina Fragouli Email: christina.fragouli@epfl.ch Patrick Thiran Email: patrick.thiran@epfl.ch Abstract We propose

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

On Benefits of Network Coding in Bidirected Networks and Hyper-networks

On Benefits of Network Coding in Bidirected Networks and Hyper-networks On Benefits of Network Coding in Bidirected Networks and Hyper-networks Zongpeng Li University of Calgary / INC, CUHK December 1 2011, at UNSW Joint work with: Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang

More information

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are

More information

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu

More information

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks 211 International Symposium of Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks Samat Shabdanov, Catherine

More information

On the multiple unicast network coding conjecture

On the multiple unicast network coding conjecture On the multiple unicast networ coding conjecture The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Langberg,

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,

More information

Insecure Provable Secure Network Coding

Insecure Provable Secure Network Coding Insecure Provable Secure Network Coding Yongge Wang UNC Charlotte, USA yonwang@uncc.edu October 18, 2009 Abstract Network coding allows the routers to mix the received information before forwarding them

More information

Network Monitoring in Multicast Networks Using Network Coding

Network Monitoring in Multicast Networks Using Network Coding Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: trace@mit.edu Ben Leong, Yu-Han Chang, Yonggang Wen

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks WTS 2014 April 9-11, 2014 Washington, DC Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering

More information

On the Network Coding Advantage for Wireless Multicast in Euclidean Space

On the Network Coding Advantage for Wireless Multicast in Euclidean Space 2008 International Conference on Information Processing in Sensor Networks On the Network Coding Advantage for Wireless Multicast in Euclidean Space Ashish Goel Stanford University Stanford, CA 94305 ashishg@stanford.edu

More information

Network Coding Approach: Intra-Cluster Information Exchange in Sensor Networks

Network Coding Approach: Intra-Cluster Information Exchange in Sensor Networks 1 Network oding pproach: Intra-luster Information Exchange in Sensor Networks Zhiqiang Xiong, Wei Liu, Jiaqing Huang, Wenqing heng, Zongkai Yang Huazhong University of Science and Technology Wuhan, Hubei

More information

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network 1 Shuai Wang 2 Athanasios Vasilakos 1 Hongbo Jiang 1 Xiaoqiang Ma 1 Wenyu Liu 1 Kai Peng 1 Bo Liu 1 Yan Dong

More information

NECO: Network Coding Simulator

NECO: Network Coding Simulator NECO: Network Coding Simulator Diogo Ferreira 1, Luísa Lima 2, João Barros 1 1 Instituto de Telecomunicações Faculdade de Engenharia da Universidade do Porto 2 Instituto de Telecomunicações Faculdade de

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

A Systematic Approach to Network Coding Problems using Conflict Graphs

A Systematic Approach to Network Coding Problems using Conflict Graphs A Systematic Approach to Network Coding Problems using Conflict Graphs Jay Kumar Sundararajan Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139,

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs Suhas Shetty Ahmed E. Kamal Department of Electrical and Computer Engineering, Iowa State University, Ames,

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Published in: Mobile Wireless Middleware, Operating Systems, and Applications - Workshops

Published in: Mobile Wireless Middleware, Operating Systems, and Applications - Workshops Aalborg Universitet Connecting the islands - enabling global connectivity through local cooperation Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank Hanns Paul; Larsen, Torben Published in: Mobile

More information

Network Routing Capacity

Network Routing Capacity IEEE TRANSACTIONS ON INFORMATION THEORY (FINAL VERSION NOV., 2005) CANNONS-DOUGHERTY-FREILING-ZEGER Network Routing Capacity Jillian Cannons, Randall Dougherty, Chris Freiling, and Kenneth Zeger Abstract

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

WHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks

WHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks 570 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Bounding the Coding Advantage of Combination Network Coding in Undirected Networks Shreya Maheshwar, Zongpeng Li, Member, IEEE,

More information

NETWORK coding is an area that has emerged in 2000 [1],

NETWORK coding is an area that has emerged in 2000 [1], 450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider

More information

Network Coding for Joint Storage and Transmission with Minimum Cost

Network Coding for Joint Storage and Transmission with Minimum Cost Network Coding for Joint Storage and Transmission with Minimum Cost Anxiao (Andrew) Jiang Department of Computer Science, Texas A&M University, College Station, TX 77843-3112. ajiang@cs.tamu.edu. Abstract

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Network Coding Aware Power Control in Wireless Networks

Network Coding Aware Power Control in Wireless Networks Network Coding Aware Power Control in Wireless Networks Kai Su, Dan Zhang, Narayan B Mandayam WINLAB, Rutgers University 67 Route South, North Brunswick, NJ 892 Email: {kais, bacholic, narayan}@winlabrutgersedu

More information

Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference

Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference Chengyu Xiong and Xiaohua Li Department of Electrical and Computer Engineering State University of New York at Binghamton

More information

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Chenglin Li 1, Junni Zou 2, Hongkai Xiong 1, Yongsheng Zhang 1 1 Department of Electronic Engineering, Shanghai

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Topology Inference using Network Coding

Topology Inference using Network Coding Topology Inference using Network Coding Christina Fragouli, Athina Markopoulou and Suhas Diggavi Abstract The network coding paradigm is based on the idea that independent information flows can be linearly

More information

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Tara Small, Baochun Li, and Ben Liang Department of Electrical and Computer Engineering University of Toronto {tsmall, bli}@eecg.toronto.edu,

More information

Low Complexity Opportunistic Decoder for Network Coding

Low Complexity Opportunistic Decoder for Network Coding Low Complexity Opportunistic Decoder for Network Coding Bei Yin, Michael Wu, Guohui Wang, and Joseph R. Cavallaro ECE Department, Rice University, 6100 Main St., Houston, TX 77005 Email: {by2, mbw2, wgh,

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

DCAR: Distributed Coding-Aware Routing in Wireless Networks

DCAR: Distributed Coding-Aware Routing in Wireless Networks : Distributed Coding-Aware Routing in Wireless Networks Jilin Le, John C.S. Lui Department of Computer Science and Engineering Chinese University of Hong Kong {jlle, cslui}@cse.cuhk.edu.hk Dah Ming Chiu

More information

Coded Cooperative Data Exchange for Multiple Unicasts

Coded Cooperative Data Exchange for Multiple Unicasts Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:

More information

A Proactive Network Coding Strategy for Pervasive Wireless Networking

A Proactive Network Coding Strategy for Pervasive Wireless Networking A Proactive Network Coding Strategy for Pervasive Wireless Networking Elena Fasolo, Michele Rossi,Jörg Widmer and Michele Zorzi DEI, University of Padova, via Gradenigo 6/B 353 Padova, Italy DoCoMo Euro-Labs,

More information

Space Information Flow

Space Information Flow Space Information Flow Zongpeng Li Dept. of Computer Science, University of Calgary and Institute of Network Coding, CUHK zongpeng@ucalgary.ca Chuan Wu Department of Computer Science The University of

More information

Embracing Wireless Interference: Analog Network Coding

Embracing Wireless Interference: Analog Network Coding Embracing Wireless Interference: Analog Network Coding By Sachin Katti, Shyamnath Gollakota, and Dina Katabi Shyamala Villupuram Sundararaman University of Freiburg shyamala.villupuram.sundararaman@venus.uni-freiburg.de

More information

Optimal Reverse Carpooling Over Wireless Networks - A Distributed Optimization Approach

Optimal Reverse Carpooling Over Wireless Networks - A Distributed Optimization Approach 1 Optimal Reverse Carpooling Over Wireless Networks - A Distributed Optimization Approach Ali ParandehGheibi, Asu Ozdaglar, Michelle Effros, Muriel Médard parandeh@mit.edu, asuman@mit.edu, effros@caltech.edu,

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

I. INTRODUCTION. and > 0 is any positive real number. We also show that for k = O( ), the per-flow multicast capacity under Gaussian

I. INTRODUCTION. and > 0 is any positive real number. We also show that for k = O( ), the per-flow multicast capacity under Gaussian IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 18, NO 4, AUGUST 2010 1145 Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model Xiang-Yang Li, Senior Member, IEEE, Yunhao Liu, Senior Member,

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,

More information

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Near Optimal Broadcast with Network Coding in Large Sensor Networks in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA

More information

Network Coding in Underwater Sensor Networks

Network Coding in Underwater Sensor Networks in Underwater Sensor Networks Claude Manville, Abdulaziz Miyajan, Ayman Alharbi, Haining Mo, Michael Zuba and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs,

More information

An Application of deterministic Network Coding in MANETs

An Application of deterministic Network Coding in MANETs An Application of deterministic Network Coding in MANETs Leenta M.J. Grobler, Albert S.J. Helberg, Henri Marais, Coenraad C. Naudé School for Electrical, Electronic and Computer Engineering North-West

More information

Countering Byzantine Attacks in the Networks with Random Linear Network Coding

Countering Byzantine Attacks in the Networks with Random Linear Network Coding Countering Byzantine Attacks in the Networks with Random Linear Network Coding Jen-Yeu Chen Department of Electrical Engineering National Dong Hwa University Email:jenyeu@mail.ndhu.edu.tw Yi-Ying Tseng

More information

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks Luca Scalia, Fabio Soldo, Mario Gerla Dipartimento di Ingegneria Elettrica, Elettronica e delle Telecomunicazioni,

More information

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments Sachin Katti Dina Katabi Wenjun Hu Hariharan Rahul Muriel Médard {skatti@, dk@, wenjun@csail., rahul@csail., medard@}mit.edu

More information

Dynamic Index Coding for Wireless Broadcast Networks

Dynamic Index Coding for Wireless Broadcast Networks PROC. IEEE INFOCOM 202 Dynamic Index Coding for Wireless Broadcast Networks Michael J. Neely, Arash Saber Tehrani, Zhen Zhang Abstract We consider a wireless broadcast station that transmits packets to

More information

Cascaded Coded Distributed Computing on Heterogeneous Networks

Cascaded Coded Distributed Computing on Heterogeneous Networks Cascaded Coded Distributed Computing on Heterogeneous Networks Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT,

More information

Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding

Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding Jörg Widmer, Christina Fragouli, and Jean-Yves Le oudec Ecole Polytechnique Fédérale de Lausanne (EPFL), CH-15

More information

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Presentation: Alexandros Manolakos EE 360 Stanford University February 13, 2012 Table of Contents What are we trying to solve?

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Practical Network Coding in Sensor Networks: Quo Vadis?

Practical Network Coding in Sensor Networks: Quo Vadis? Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),

More information

The Complexity of Connectivity in Wireless Networks. Roger WISARD

The Complexity of Connectivity in Wireless Networks. Roger WISARD The Complexity of Connectivity in Wireless Networks Roger Wattenhofer @ WISARD 2008 1 The paper Joint work with Thomas Moscibroda Former PhD student of mine Now researcher at Microsoft Research, Redmond

More information

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute

More information

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

Real Network Codes 1 INTRODUCTION. WeD2.1

Real Network Codes 1 INTRODUCTION. WeD2.1 Forty-Fifth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 26-28, 2007 Real Network Codes Sachin Katti Saurabh Shintre Sidharth Jaggi Dina Katabi Muriel Medard skatti@mit.edu

More information

Flow Based XOR Network Coding for Lossy Wireless Networks

Flow Based XOR Network Coding for Lossy Wireless Networks Flow Based XOR Network Coding for Lossy Wireless Networks Abdallah Khreishah, Jie Wu, Pouya Ostovari, and Issa M. Khalil Department of Computer & Information Sciences, Temple University, Philadelphia,

More information

The Maximum Throughput of A Wireless Multi-Hop Path

The Maximum Throughput of A Wireless Multi-Hop Path The Maximum Throughput of A Wireless Multi-Hop Path Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia Email: guoqiang@ee.usyd.edu.au Abstract In

More information

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Jian Zhang ECE Department Rutgers University New Brunswick, U.S.A. jianz@caip.rutgers.edu Yuanzhu Peter Chen Department of Computer

More information

A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks

A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks Tuan Tran, Thinh Nguyen and Bella Bose School of EECS, Oregon State University Corvallis, OR 97, USA {trantu, thinhq}@eecs.oregonstate.edu;

More information

Wireless Broadcast Using Network Coding

Wireless Broadcast Using Network Coding Wireless Broadcast Using Network Coding Dong Nguyen, Tuan Tran, Thinh Nguyen, Bella Bose School of EECS, Oregon State University Corvallis, OR 9733, USA {nguyendo, trantu, thinhq}@eecs.oregonstate.edu;

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Reliability Benefit of Network Coding

Reliability Benefit of Network Coding Reliability Benefit of Majid Ghaderi, Don Towsley and Jim Kurose Department of Computer Science University of Massachusetts Amherst {mghaderi,towsley,kurose}@cs.umass.edu Abstract The capacity benefit

More information

Time-Bounded Essential Localization for Wireless Sensor Networks

Time-Bounded Essential Localization for Wireless Sensor Networks IEEE TRANSACTIONS ON NETWORKING 1 Time-Bounded Essential Localization for Wireless Sensor Networks Wei Cheng, Member, IEEE, Nan Zhang, Member, IEEE, Xiuzhen Cheng, Senior Member, IEEE, Min Song, Senior

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Performance Evaluation of Wireless Network Coding under Practical Settings

Performance Evaluation of Wireless Network Coding under Practical Settings Performance Evaluation of Wireless Network Coding under Practical Settings Ihsan A. Qazi Pratik Gandhi Department of Computer Science School of Information Sciences University of Pittsburgh, Pittsburgh,

More information

Max-Flow Protection using Network Coding

Max-Flow Protection using Network Coding Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State

More information

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks Comparison of Analytical and Measured Performance Results on Network Coding in IEEE 802.11 Ad-Hoc Networks Fang Zhao Singapore-MIT Alliance for Research and Technology, Singapore Email:fang.zhao@smart.mit.edu

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Multi-Cluster Interleaving on Paths and Cycles

Multi-Cluster Interleaving on Paths and Cycles Multi-Cluster Interleaving on Paths and Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving codewords is an important method not only for combatting burst-errors,

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 2509 2516 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Delay-based network coding packet selection Rasoul

More information

THE demand for widespread Internet access over large

THE demand for widespread Internet access over large 3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

An Optimal Symmetric Secret Distribution of Star Networks 1

An Optimal Symmetric Secret Distribution of Star Networks 1 An Optimal Symmetric Secret Distribution of Star Networks 1 Bruhadeshwar Bezawada Department of Computer Science International Institute of Information Technology Hyderabad, India 500032 Sandeep S. Kulkarni

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information